Search result for Information security course dod Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity and the X-Factor
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 12 hours to complete
The course will conclude with information designed to assist you with some critical components for your business security program. Security and Employee Compliance Industry Q&A: Security and End Users MISQ Executive: Information Security Management Overview Shadow IT: Mitigating Security Risks Security Education: Training & Awareness Industry Q&A: Customers and Security Training...
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
In this course we discuss what makes home computing systems different from enterprise computing systems. This course may also be for those who are looking to understand how computer security plays an important role in system management. About this course Good system management starts with knowing security Why information security in the first place? Information Security Course Project - BYOD...
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. Information Security Management Information Security Performance Measurement Introduction to Key Security Laws Information Security and Law...
Privacy Law and HIPAA
by Lauren SteinfeldTop Instructor- 4.4
Approx. 12 hours to complete
We’ll explore the notion that one cannot have privacy without strong security and examine various models that promote the security of personal information. Welcome to the Course Fair Information Principles Fair Information Principles Security & Breach Notification Introduction to Security Compliance Observations in Information Security Data Security Summary of the HIPAA Security Rule...
AWS Fundamentals: Going Cloud-Native
by Allen GoldbergTop Instructor , Morgan Willis , Blaine SundrudTop Instructor- 4.7
Approx. 9 hours to complete
This course will introduce you to Amazon Web Services (AWS) core services and infrastructure. Later in the course you'll learn about AWS Database services, such as Amazon Relational Database Service (RDS) and Amazon DynomoDB. This course has been developed by AWS, and is delivered by AWS technical instructors who teach cloud computing courses around the globe. Course Welcome Notes...
Introduction to Corporate Information Security
by Illumeo Learning- 0.0
39 mins on-demand video
This course explains why information security and its management are important for any modern organization. Information security underpins the commercial viability and profitability of enterprises of all sizes and the effectiveness of public sector organizations. This course explains the basics of information security and why information security and its management are important for any modern organization....
$12.99
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. Wireless Security Creating a Company Culture for Security...
Related searches
Software Design Threats and Mitigations
by Albert Glock- 4.7
Approx. 19 hours to complete
Open source threat and mitigation information Open source threat and mitigation information Building Security in Security as a build-on, not an add-on Active vs Passive security Active vs Passive security...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way. Security Operations and Administration Course Introduction...
Palo Alto Networks Cybersecurity Gateway II
by James Dalton- 4.7
Approx. 16 hours to complete
Gateway II Course Description GATEWAY II: MODULE 1 - COURSE INFORMATION Gateway II Course Information - Textbook and Work Roles Gateway II: Module 3 - Cloud, Virtualization and Storage Security Reading: Cloud, Virtualization and Storage Security...